PROVISIONING of quality of service (QoS) is critical for

808 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007 Towards Universal Power Efficient Scheduling in Gaussian Channels Din...
Author: Domenic Kelley
1 downloads 0 Views 388KB Size
808

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007

Towards Universal Power Efficient Scheduling in Gaussian Channels Dinesh Rajan, Member, IEEE Abstract— In this paper, we propose a framework for designing power efficient schedulers for transmitting bursty traffic sources over Gaussian wireless channels that provides deterministic and statistical guarantees on absolute delays experienced by the source packets. The proposed schedulers compute the transmission rate and power using temporal water-filling techniques without any knowledge of the arrival traffic statistics. The schedulers reduce the average transmission power substantially (55% in some scenarios) for small increases in delay. The framework allows us to design schedulers that artfully tradeoff the performance with the complexity of computing the schedulers. We also introduce an iterative process to compute a lower bound on the transmit power of any scheduler that provides absolute delay guarantees. The utility of having accurate traffic predictors is demonstrated; specifically, we show that a perfect one step predictor achieves near optimal performances for small delay bounds. The proposed schedulers and iterative method of computing the lower bound are also shown to provide statistical guarantees on packet delays. Index Terms— Scheduling, Power control, Data Traffic, Delay bounds.

I. I NTRODUCTION

P

ROVISIONING of quality of service (QoS) is critical for the success of high data rate multimedia services in future wireless networks. In this paper, we propose power efficient schedulers for transmitting bursty traffic sources through a wireless channel. The proposed schedulers provide deterministic or statistical guarantees on absolute packet delays without any prior knowledge of the arrival traffic statistics. Scheduling is commonly used to refer to the allocation of a particular resource (like bandwidth) to multiple competing entities (like flows) under certain constraints (like fairness); for example, a first come first serve (FCFS) scheduler. In this paper, we consider a single user system with varying number of packet arrivals in every time-slot; such a source is referred to as a bursty source. A scheduler is defined (in Section II) as a mapping from the number of packet arrivals and state of the system to the number of packets transmitted. Schedulers are proposed for both stationary and nonstationary traffic sources. The contributions of this paper are as follows: • Computes a universal lower bound on the transmit power required by any scheduler that provides deterministic or statistical guarantees on absolute packet delays. The lower bound is computed iteratively and in an off-line manner for a given sequence of packets arrivals. The scheduler which Manuscript received May 2006, revised November 2006. This work has been supported by the National Science Foundation under grant CCF0546519. Part of this paper was presented at the International Conference on Communications (ICC), Paris, June 2004. The author is with the Department of Electrical Engineering, Southern Methodist University, Dallas, Texas, USA (e-mail: [email protected]). Digital Object Identifier 10.1109/JSAC.2007.070516.

achieves this lower bound is referred to as noncausal minimal power (NOMP) scheduler. • Proposes a simple memoryless (and causal) scheduler that uses no information on prior scheduled packets or future arrivals to schedule packets: Its performance serves as an upper bound on transmission power and can be computed in closed form. An approximate relationship between transmission power and delay bound is derived. Remarkably, it is shown that the derived approximate relationship is analogous to Shannon’s capacity formulation in which the rate is replaced by the effective bandwidth of the source. • For nonstationary sources, a low complexity water-filling based causal look ahead (CLAD)-0th order1 scheduler is proposed that has low power consumption. • For stationary sources, a CLAD-1 scheduler is proposed that uses information of prior arrivals to predict the statistics of future arrivals and schedule packets. The power of this scheduler is lower than that of CLAD-0 schedulers and is near optimal. • A simple noncausal scheduler, labeled NCLAD-1, is proposed that assumes perfect knowledge of exactly one future arrival. The performance of a NCLAD-1 scheduler shows that an efficient 1-step predictor achieves near optimal performance for all traffic scenarios. Thus, various traffic prediction methods (e.g. neural network based) can be used to construct optimal schedulers. All the proposed schedulers are solutions of minimizing the transmit power under various constraints: The solutions of these optimization problems (except for CLAD-1 scheduler) can be interpreted as constrained temporal water-filling and involves low computational complexity. These schedulers can thus be readily adapted for implementing in various networks including cellular data networks, WLANs, ad-hoc networks and mesh networks. The proposed delay bounded schedulers are conceptually similar to rate and power adaptation in fading channels with short term power constraints [2]. Since the proposed CLAD scheduler achieves performances near that of the NOMP scheduler without any knowledge of arrival traffic, it can be considered to be a preliminary or first generation universal scheduler. The results in this paper suggest three main messages: i) Irrespective of traffic, simple schedulers exist which are near optimal, ii) Perfect one step traffic predictor achieves near optimal performance for low to medium values of delay, and iii) An approximate formula can be derived for powerdelay relationship that depends only on first and second order statistics of the arrival traffic. 1 The

order of the scheduler is defined in Section III.

c 2007 IEEE 0733-8716/07/$25.00 

RAJAN: TOWARDS UNIVERSAL POWER EFFICIENT SCHEDULING IN GAUSSIAN CHANNELS

Recognizing that a substantial portion of the energy consumption in a wireless communication system is at the transmitter, in this paper, we focus on minimizing the transmit power under delay constraints. Power minimization for uplink transmission is important in mobile terminals due to the limited battery resources. Using low power transmission to obtain the desired downlink performance is also important at the base station since it results in reduced interference to other users and consequently increased system throughput. The importance of incorporating traffic models in the design of wireless communication systems has been well recognized [3], [4]. Techniques that delay data transmission based on channel conditions is commonly used to save transmission power. The transmission scheme which maximizes longterm throughput transmits more power and information in good channel states, and less in poor conditions [5]. Similar concepts are used in the INFOSTATION [6] architectures, where mobile nodes transmit data only when they are close to base-stations; thus, reducing transmission power for increased delays. Schedulers that minimize the transmit power under average delay constraints have been considered in [7]– [10]. These approaches typically use dynamic programming methods to obtain optimal transmission policies. Schedulers that provide QoS guarantees have been an area of active research (see for example [11]); however, many of these have been proposed for constant rate data links like in wired networks. In wireless channels, the instantaneous throughput depends on the channel conditions and the transmit power and is therefore not a constant. There is extensive work on scheduling over wireless channels: see [12]–[16] for a partial list of relevant work. The primary motive behind these works is to efficiently use system resources, often with an aim of fair division of resources. Moreover, a lot of emphasis is given on exploiting the multiuser diversity effects [17], [18]. The remainder of this paper is organized as follows. We introduce some basic notation and formalize the scheduling problem in Section II. Schedulers with deterministic and statistical guarantees on delay are introduced in Sections III and IV respectively. Finally, we conclude in Section V. II. P ROBLEM SETUP Consider a system in which an packets arrive at the transmitter at the beginning of time-slot n. Let D0 be the desired absolute packet delay bound. Delay is measured in terms of the number of time-slots and we use the convention that if packets arriving in time-slot n are transmitted in the same time-slot, then the delay equals 1 time-slot. To deterministically meet the delay bound all an packets have to be transmitted within time-slots n, n + 1, . . . , n + D0 − 1. All arriving packets are stored in a buffer which is assumed to be large enough not to cause any overflows.2 In this paper, we treat each packet as being infinitely divisible and partial packet transmissions in a time-slot are allowed. For simplicity, we only consider an additive white Gaussian noise (AWGN) channel. The analysis can be easily extended to block fading channels. 2 If the maximum packet arrival M in any slot is known, then the buffer size needed to prevent overflows is M D0 .

809

The received signal, Yn , is given by Yn = Xn + zn , where Xn is the transmitted signal and zn is the additive Gaussian noise with variance σ 2 . The signals Yn , Xn and zn are Tc dimensional vectors, where Tc is the number of symbols in each time-slot. The transmit signal, Xn , depends on the number of packets, un , transmitted in time-slot n and the coding and modulation scheme used. Transmit power Pn is chosen to ensure that Xn can be reliably determined from Yn . In this paper, we consider reliability in the Shannon theoretic sense and use the well known Gaussian capacity formulation [19] to compute the power required to transmit un packets as Pn = P (un ) = σ 2 (eRun − 1), where R is the size of the packet in bits. Although, such reliability metrics are valid only asymptotically, the performance of practical advanced coding schemes is very close to information theoretic limits. Moreover, similar functional forms like P (un ) with additional penalty term can be used to model practical systems with finite probability of error. The average power N  P (ui ) for of any scheduler can then be computed as N1 i=1

a given packet arrival sequence {an }N 1 . Denote by vn,i the number of packets transmitted during time-slot n that arrived during time-slot n − i. Definition 1: A scheduler is defined as a mapping from the number of packet arrivals, an and scheduler state, Sn to the number of packets transmitted in different time-slots, vn+i,i , ∀i ≥ 0, i.e., (an , Sn ) → vn+i,i . In other words, at each time-slot n the scheduler computes when each of the an packets should be transmitted. Recognize that schedulers which determine the transmission rate (i.e., number of packets transmitted in each time-slot) based only on the total number of packets in the buffer cannot deterministically guarantee the desired delay bound. Thus, buffer state is not a sufficient statistic for guaranteeing a delay bound. The state of the scheduler, Sn , at time-slot n depends on the type of scheduler. For a NOMP scheduler, the state is Sn = φ({ai }N i=1 ), where N is the length of the arrival sequence and φ() is a function that represents the relation between packet arrivals and current scheduler state. Although, we do not explicitly characterize this functional form, its value will be clarified  in the different cases. For the CLAD schedulers, Sn = φ {ai }n−1 i=1 and for the memoryless scheduler Sn = Λ, the null state. All the proposed schedulers are assumed to be stationary (i.e. the mapping is time-invariant) even if the arrivals are not stationary. For a scheduler that provides deterministic delay guarantees all packets have to be transmitted within D0 time-slots of D 0 −1 vn+j,j = an . For a arriving at the transmit buffer, i.e., j=0

scheduler that provides statistical delay guarantees, at most δ% of the packets may violate the delay bound, i.e., P r{di > D0 } ≤ δ,

(1)

where di is the absolute delay of the ith packet and δ is the fraction of packets that violate the delay bound. In this paper, we assume that packets which violate the delay bound

810

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007

are dropped.3 Thus, vn,i = 0 for i ∈ / {0, 1, . . . , D0 − 1}. The number of packets, un , transmitted in time-slot n is D 0 −1 given by un = vn,j . In the next section, we compute j=0

power efficient schedulers that provide deterministic delay guarantees. Note that with no constraint on the maximum packet arrivals within a time-slot, an absolute delay bound cannot be guaranteed with finite transmission power. In power constrained systems, an outage formulation is more applicable [20]. We do not consider power limited systems in this paper; our goal is to characterize bounds on power required to provide certain delay guarantees to the traffic. As one application of our results, we show in Section IV how increasing the ratio of packets that violate delay bound can be used to provide service in power constrained systems. III. S CHEDULERS WITH DETERMINISTIC DELAY GUARANTEES

In this section, we compute power optimal schedulers with different amounts of information available to the scheduler. We first compute a noncausal scheduler, whose performance serves as a lower bound on the performance of any scheduler and then proceed to compute different causal schedulers that approach the performance lower bound. A. Noncausal minimal power (NOMP) scheduler We first compute a noncausal scheduler that uses information about the entire arrival sequence (i.e., Sn = φ({ai }N i=1 )) to schedule packets and minimize the average power consumption. The problem of interest can be formally stated as follows, ⎞ ⎛ D N 0 −1  1 PN∗ OMP = min P⎝ vi,j ⎠ N i=1 {vi,j } j=0 i=1...,N, j=0,...,D0 −1

0 ≤ vi,j ;

D 0 −1

vi+j,j = ai , i = 1, . . . , N (2)

j=0

D D 0 −1 0 −1 0 −1 ⎥ ⎢D ⎢ v , v , . . . , vn+D0 −1,j ⎥ n,j n+1,j ⎦. ⎣ j=0

j=0 j=1

B. Causal look ahead (CLAD)-0 schedulers We now propose a series of causal schedulers labeled CLAD-k schedulers in which the order of the scheduler, k, is the number of future time-slots up to which arrivals are predicted. The rationale is that for stationary sources, the statistics of future arrivals can be estimated from prior arrivals. The CLAD-0 scheduler does not predict the statistics of future arrivals and can be used even when the traffic is nonstationary. To derive the CLAD-0 scheduler, we modify (2) to minimize the local average power rather than global average power. The state of the scheduler Sn = φ({ai }ni=1 ). In this case, S ⎡n can be considered as a D0 state vector with ⎤ elements D D D 0 −1 0 −1 0 −1 ⎣ vn,j , vn+1,j , . . . , vn+D0 −2,j , 0⎦. At timej=1

j=D0 −1

j=2

slot n, the CLAD-0 scheduler computes vn+j,j , j = D 0 −1 P (˜ un+j ), where u ˜n+j = 0, 1, . . . , D0 − 1 to minimize j=0

D 0 −1

vn+j,k is the number of packets scheduled for transmis-

k=j

sion at time-slot n+j that arrived during or before time-slot n. Note that this scheduler uses the knowledge of prior scheduled transmissions, vn+j,i , i = j + 1, . . . , D0 via Sn to compute vn+j,j . Formally, D −1  D0 −1 0  1  ∗ min P vn+i,k PCLAD−0 = {vn+j,j } D0 i=0 k=i

j=0,...,D0 −1

It should be noted that a boundary condition on vk,j imposed due to causality is not explicitly mentioned in (2). Specifically, recognize that vk,j = 0, for k < D0 and j ≥ k, since there are no packet arrivals before time-slot 0. In this case, the scheduler state Sn can be considered as a D0 length vector with elements, ⎤ ⎡

j=0

a minimum. In Appendix A, we give an iterative method for computing PN∗ OMP . The iterative procedure schedules packet transmissions using information of future arrivals in a noncausal manner. Hence, the scheduler is referred to as a noncausal minimal power (NOMP) scheduler and its performance serves as a lower bound on the power of any scheduler that guarantees delay bound D0 for that arrival sequence. Numerical values of the lower bound are given in Figure 4 and explained in Section III-G.

j=0

j=D0 −1

Recall that the scheduler computes the number of packets to transmit and the power based on Sn and an . For any given sequence of packet arrivals {an }N 1 , it can be shown that (2) is a convex optimization problem and has 3 An alternative formulation is to ensure that all packets have to be completely transmitted, but up to δ% of them may violate the delay bound. In this case, packets which violate the delay bound are queued separately (rather than dropped) and transmitted when un ≤ E[an ], i.e., when there are not too many packets scheduled for transmission.

0 ≤ vn+j,j ,

D 0 −1

vn+j,j = an

(3)

j=0

It can be easily shown that the solution to (3) is given by temporal water-filling as ⎞+ ⎛ D 0 −1 vn+j,k ⎠ , j = 0, . . . , D0 − 1 (4) vn+j,j = ⎝α − k=j+1

where (x)+

D 0 −1

=

max{x, 0}, and α is computed from +

(α − vn+j,j ) = an . The performance of this scheduler

j=0

is shown in Figure 4 and is discussed in Section III-G. C. CLAD-1 scheduler For stationary sources, we propose a scheduler which minimizes local transmit power by estimating the distribution of future arrivals. In this paper, we use a simple histogram to

RAJAN: TOWARDS UNIVERSAL POWER EFFICIENT SCHEDULING IN GAUSSIAN CHANNELS

estimate the distribution of future arrivals and thus pˆ(an+1 = n  1 i) = n I(ak = i), ∀i, where I() is the indicator funck=1

tion. As n increases pˆ → p, the true distribution of the source. At each time-slot n the CLAD-1 scheduler not only (k) computes vn+j,j but also vn+j+1,j for k = 1, . . . , Mn = (k) max{a1 , . . . , an }. Note that vn+j+1,j represents the number of packets transmitted in time-slot n + j + 1 if k packets arrive at time-slot n + 1. Formally, the scheduler is chosen to optimize ∗ PCLAD−1

=

D0 Mn  

min

(k)

{vn+j,j ,vn+j+1,j } k=0 i=0

P (ˆ un+i )p(an+1

j=0,1,...,D0 −1

0 ≤ vn+j,j ,

D 0 −1

vn+j,j = an ,

j=0 D 0 −1

(k)

D 0 −1

The main motivation behind the NCLAD-1 scheduler is to understand and quantify the gains in using traffic predictors in the scheduling context. The NCLAD1 scheduler minimizes local transmit power assuming that one future arrival is known exactly, i.e., at time-instant n, scheduler has knowledge of {ai , i = n+1 1, ⎡ . . . , n + 1}. Thus, scheduler state Sn = φ({ai }1 ) =⎤ D D D 0 −1 0 −1 0 −1 0 −1  ⎥ ⎢D ⎢ v , v , v , . . . , vn+D0 −1,j ⎥ n,j n+1,j n+2,j ⎦; ⎣ j=1

D 0 −1

vn+j,j = an

(6)

j=0

k=j+1

(7)

D 0 −1 

(α − vn+j,j )+ = an . Although,

j=0

vn+i,j . Solving (5) analytically is in-

D. NCLAD-1 scheduler

j=0

0 ≤ vn+j,j ,

where α is computed as

j=0

j=0

k=(i−1)

j=0,...,D0 −1

vn+j+1,j = k ∀1 ≤ k ≤ max{a1 , . . . , an }

tractable and hence we resort to numerical optimization techniques. The performance of the CLAD-1 scheduler is given in Figure 4 and explained in Section III-G. The CLAD-m schedulers can be derived using similar techniques: However, their computational complexity increases with m. Moreover, as will become evident from Section IIIG the performance of the CLAD-1 scheduler is close to the NOMP scheduler and thus is a reasonable choice for obtaining good performance at low complexity. It should be reiterated that the CLAD-m schedulers assume stationarity of the arrival traffic and are not guaranteed to provide significant scheduling gains when the traffic is non-stationary. The formulation of the CLAD-m schedulers are not unique. For example, a lower complexity CLAD-1 scheduler formulation assumes that when computing the scheduler at time-slot n, the an+1 packets are uniformly split and transmitted over D0 time-slots. A similar approach is taken in the NCLAD-m schedulers which is discussed next.

j=0

n + 1, . . . , n + D0 . 4 Similar to the earlier cases, the optimization problem is posed as, ⎞ ⎛ D D 0 −1 0 −1  1 min P⎝ vn+i,k ⎠ . PN∗ CLAD−1 = {vn+j,j } D0 + i=0

The solution is again obtained by temporal water-filling as ⎧⎛ ⎞+ = k) D 0 −1 ⎪ ⎪ ⎪ ⎪ ⎝α − vn+j,k ⎠ , j=0 ⎪ ⎪ ⎨ k=j+1 ⎞+ vn+j,j = ⎛ ⎪ (5) D 0 −1 ⎪ ⎪ a ⎪ n+1 ⎠ ⎝ ⎪ vn+j,k − D , 1 ≤ j < D0 ⎪ 0 ⎩ α−

j=0

where uˆn+i =

811

j=1 j=2

there are many different schedulers that use knowledge of future arrivals, our results indicate that the proposed NCLAD1 scheduler is near optimal for small delay bounds. Moreover, the complexity of the proposed NCLAD-1 scheduler is low. Numerical values of the NCLAD-1 scheduler is given in Figure 6 and explained in Section III-G. As noted earlier, the main objective of the NCLAD-1 scheduler is to study the effect of perfect one step traffic predictor on scheduler performance.

E. Memoryless scheduler We now present a simple memoryless scheduler in which vn+j,j , j = 0, 1, . . . , D0 − 1 depends only on an and not on the prior scheduled packets; thus Sn = Λ, the Null state. Specifically, the memoryless scheduler uniformly spreads the packet transmissions across the entire available time-slots, D 0 −1 an−j . This i.e., vn+j,j = D10 an and thus, un = D10 j=0

memoryless scheduler serves four objectives: i) Its performance serves as an upper bound on the transmit power of any scheduler for arbitrary delay bounds, ii) Its performance can be derived analytically in closed form, if the traffic is stationary. iii) It is used to show the connection between filtering and scheduling and derive the delay-bandwidth relationship, and iv) An approximate formula for the power of this scheduler at large delay bounds is derived that depends only on the first and second order statistics of the incoming traffic. Remarkably, this approximate formulation is similar to the notion of effective bandwidth [21]. For non-stationary sources, the first and second order statistics in the approximate formula are replaced by the sample mean and variance for that arrival sequence.

j=D0 −2 j=D0 −1

note the noncausal nature of Sn which depends on an+1 . Moreover, the NCLAD-1 scheduler assumes that the an+1 packets are uniformly divided and transmitted over time-slots

4 An approach similar to the CLAD-1 scheduler can be used in which the scheduler at time n attempts to optimize the transmission of the an+1 packets also; however, as the results indicate, the proposed NCLAD-1 scheduler attains near optimal performance for small delays.

812

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007

5.5

to model, e.g. Ethernet traffic. The approximation derived in Appendix B is given as follows:   1 1 Rσa2 P ) = R(λ + Rσu2 ), (11) log 1 + 2 = R(λ + σ 2 D0 2

MEMORYLESS SCHEDULER APPROXIMATION

2

log (1 + P/σ )

5

4.5

4

3.5

3 0

Fig. 1.

0.1

0.2

0.3

0.4 0.5 0.6 1 / DELAY BOUND

0.7

0.8

0.9

1

Performance of approximate power derivation for Ethernet traffic

1) Closed form analysis: The average power of the memoryless scheduler, Pmemoryless , is given by ⎞ ⎛ D0 −1 N 1  ⎝ 1  P an−j ⎠ . Pmemoryless = N n=1 D0 j=0 If the source arrivals are stationary, then Pmemoryless can be derived in closed form as   D0  a i i=1 Pmemoryless = P p(a1 , . . . , aD0 )(8) D0 a1 ...aD0 ⎛ ⎞ D0   eRai /D0 p(ai ) − 1⎠ = σ2 ⎝ a1 ...aD0 i=1

= σ

2

D 0  

e

Rai /D0

 p(ai ) − 1

where σu2 is the variance of the output traffic and is derived in Appendix B. The accuracy of the approximation (11) at high delays is evident from Figure 1 which compares the performance of the memoryless scheduler and the approximate formulation for Ethernet traffic. Interestingly, the approximation is accurate only at very high delays (on the order of 100 time-slots or higher) for Ethernet traffic. However, for MPEG and i.i.d traffic, the approximation holds at smaller values of delay bound.5 Moreover, the analysis easily extends to the case of multiple flows with different delay constraints and our results will be presented at a later forum. 3) Non-monotonic behavior of memoryless scheduler: It should be noted that the power of the memoryless scheduler is not a monotonically decreasing function of the delay bound. A simple example illustrates this non-monotonic behavior. Consider the deterministic arrival sequence {0, M, 0, M, . . .}. For this arrival sequence and a delay bound of 2 time-slots, the memoryless scheduler transmits M/2 packets in every time-slot: Thus, the average power equals Pmemoryless (2) = σ 2 (eRM/2 − 1). For a delay bound of 3 time-slots, the scheduler alternatingly transmits M/3 and 2M/3 packets and hence the average power equals Pmemoryless (3) = σ 2 ((eRM/3 + e2RM/3 )/2 − 1). Clearly Pmemoryless (3) is greater than Pmemoryless (2) due to the convexity of the exponential function. 4) Average delay and delay distribution: The average delay of the proposed scheduler can be easily derived from Little’s law as the ratio of average buffer length E[xn ] and average arrival rate. The buffer length xn for the memoryless scheduler is given by

i=1 ai

= σ2

  D0 E[eRan /D0 ] −1 ,

(9)

xn

=

n  i=1

D0  p(ai ) is the joint pmf of the where p(a1 . . . , aD0 ) = i=1

arrivals which is assumed to be an i.i.d. process. Note that the memoryless scheduler is derived without assuming stationarity of the arrival process. The stationarity of the arrival process is only used to calculate the average power in closed form (9). Rewriting (9), we see that   P log 1 + 2 = D0 log E[eRan /D0 ] (10) σ It can be seen that as D0 → 1, the RHS equals log E[eRan ]. Also, as D0 → ∞, by the law of large numbers (applied to (8)), the RHS equals E[Ran ] which is the Shannon limit. 2) Performance analysis based on first and second order statistics: To better understand the performance of the memoryless scheduler, we derive an approximate relationship for Pmemoryless that depends only on the first order (mean) and second order (variance) statistics of the arrival process. We then study the validity of this approximation when applied to traffic for which the entire statistics are unknown or difficult

ai −

n−1 

ui

i=1

D0 − 0 D0 − 1 1 an + an−1 + + . . . + an−D0 +1 D0 D0 D0  D 0 −1  i = 1− an−i D0 i=0   It follows that E[xn ] = E[an ] D02+1 and hence the average delay equals D02+1 . For the other schedulers proposed, deriving the average delay in closed form is not feasible. A trivial upper bound on the average delay for all the proposed schedulers is D0 . It should be noted that for a specified absolute delay bound, the variance in the delay histogram, i.e., the actual delays experienced by the different packets, can be reduced without any additional increase in transmission power by applying traditional packet re-ordering mechanisms like FCFS policy. The application of the FCFS policy does not change the packet delay distribution when D0 = 2. The delay distribution before and after enforcing FCFS policy is given in Figure 2 for the CLAD-0 scheduler. Clearly, the concatenation of FCFS =

5 Plots

similar to Figure 1 for MPEG and i.i.d. traffic are not shown.

RAJAN: TOWARDS UNIVERSAL POWER EFFICIENT SCHEDULING IN GAUSSIAN CHANNELS

813

WITHOUT ENFORCING FCFS POLICY 0.5

PROBABILITY

0.4 0.3 0.2 0.1 0

1

1.5

2

2.5

3

3.5

4

3.5

4

AFTER ENFORCING FCFS POLICY

0.5

PROBABILITY

0.4 0.3 0.2 0.1 0 1

1.5

2

2.5

3

DELAYS

(a) WITHOUT ENFORCING FCFS POLICY

Fig. 3.

0.5

Water-filling interpretation of schedulers

PROBABILITY

0.4 0.3 0.2 0.1 0

1

2

3

4

5

6

7

AFTER ENFORCING FCFS POLICY

0.5

PROBABILITY

0.4 0.3

n=1

allows only certain fluids to pass through in both directions. The different fluids will settle down to as uniform a level as possible in each bin subject to valve operation constraints.

0.2 0.1 0 1

analogous to pouring the water into a vessel with D0 bins; the vertical level in the first D0 − 1 bins is proportional to the number of packets already scheduled for transmission (vn+i,j ) and the last bin is empty. The NOMP scheduler is similar to water-filling into a bin with N + D0 − 1 bins. The amount of water poured equals N  an . However, there is a valve or filter between the bins that

2

3

4

5

6

7

DELAYS

(b) Fig. 2. Histogram of delay distributions with and without imposing FCFS policy in conjunction with the proposed CLAD-0 scheduler: a) Delay bound of 4 time-slots, b) Delay bound of 7 time-slots.

policy reduces the variance of this distribution at all delays. It should be noted that by coupling with a FCFS policy, no packets are received out of order, a useful feature for real time traffic source and TCP based networks. In case of multiple flows with different deadlines, the proposed schedulers can be easily coupled with other reordering mechanisms like earliestdeadline-first (EDF) [11]. F. Water-filling interpretation of schedulers The solution of the proposed optimization problems can be interpreted using standard water-filling method. This waterfilling process is pictorially depicted in Figure 3. Consider a multiple binned vessel, where each bin corresponds to one time-slot and the base of all bins are of unit area. The volume of water poured equals an for the memoryless and CLAD-0 schedulers. The memoryless scheduler, is similar to waterfilling into Do empty bins, i.e., the an packets are distributed uniformly across all D0 bins. The CLAD-0 scheduler is

G. Numerical Results We now numerically study the performance (average power versus delay bound) of the different schedulers. Scheduler Performance for i.i.d. traffic: The average power of the different schedulers are plotted against the delay bound in Figure 4 for an i.i.d. arrival sequence of length 10,000 time-slots. Clearly, at a delay of 1 time-slot, all packets have to be transmitted in the same time-slot that they arrive. Thus, all schedulers require the same power. As the delay bound increases from 1 to 2 time-slots, the power required decreases substantially (nearly 55% for CLAD-0 scheduler) for all schedulers. Eventually, as the delay goes to infinity, the required power approaches the limit. The Shannon  Shannon N  R an and is the power limit is simply given by P N n=1

required to transmit constant rate traffic. The power required by the memoryless scheduler is higher than the power required by the CLAD-0 scheduler, which is not surprising since the memoryless scheduler does not utilize knowledge of prior packet schedules in determining the transmission rate. As the delay increases the CLAD-0 scheduler smoothes the input traffic thereby reducing burstiness of output traffic, an effect which has also been observed in case of schedulers which minimize power under average delay constraints [8]. The CLAD-1 scheduler has performance

814

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007

0.65

MEMORYLESS CLAD−0 CLAD−1 LOWER BOUND (NOMP) SHANNON LIMIT

22 20

0.55

18

0.5 AVERAGE POWER

AVERAGE POWER

MEMORYLESS WATERFILLING : CLAD − 0 LOWER BOUND

0.6

16 14 12

0.45 0.4 0.35 0.3

10 0.25

8 0.2

6 1

0.15 1

2

3

4

5 6 ABSOLUTE DELAY

7

8

9

3

4

5

6

7

8

9

DELAY BOUND

Fig. 5. Fig. 4.

2

10

Performance of proposed schedulers for MPEG traffic.

Average power versus absolute delay for the proposed schedulers. 0.0126 MEMORYLESS WATERFILLING : CLAD − 0 NCLAD − 1 LOWER BOUND SHANNON LIMIT

0.0124 0.0122

AVERAGE POWER

better than even the CLAD-0 scheduler and nearly that of the NOMP scheduler. It should be reiterated that only the CLAD-1 scheduler requires the stationarity of arrival process. The other schedulers can be used even for nonstationary traffic sources. In this case, the performance of the NCLAD-1 scheduler was similar to that of the CLAD-1 scheduler and is not shown. Scheduler Performance for MPEG traffic: The performance of the proposed schedulers is given in Figure 5 for an MPEG traffic source. The average power of the memoryless, CLAD-0 and NOMP schedulers are plotted in Figure 5. It can be seen that the average power decreases substantially (nearly 60%) for small increase in delay. Further, the performance of all three schedulers are nearly identical. Thus, for this traffic source, the memoryless and CLAD-0 schedulers exhibit near optimal performance. Analysis of the actual traffic sequence illuminates the reasons for such scheduler behavior. The MPEG traffic consists of packets that contain periodic intracoded frames (I-frames) with intercoded frames (P/B frames) in between. The I-frames contain significantly more data than the P/B frames and thus the power required to transmit the I-frames is significantly higher than the power required to transmit the P/B-frames. Hence, changing the transmission rates of the P/B frames according to prior I-frame packets scheduled and vice-versa does not provide significant power reduction over the memoryless scheduler. Scheduler Performance for wide-area traffic: The performance of the proposed schedulers for Ethernet traffic is given in Figure 6. The trace files for the simulations were obtained from [22] and details of the trace files are given in [23]. In this case, the rate of decrease of power with delay is slower than for i.i.d. or MPEG traffic. The reason for the slower decrease in average power versus delay bound curve is the self similar nature of the traffic stream, i.e., the traffic exhibits burstiness across an extremely wide range of time-scales [24]. Thus, smoothing the traffic at smaller timescales (smaller delay bounds) does not completely remove the burstiness at larger time-scales and hence the power of the CLAD-0 and memoryless schedulers are significantly higher than the NOMP scheduler. Also, the NOMP scheduler has significantly better performance than the CLAD-0 scheduler. However, for this

0.012 0.0118 0.0116 0.0114 0.0112 0.011 0.0108 1

Fig. 6.

2

3

4

5 6 DELAY BOUND

7

8

9

Performance of proposed schedulers for Ethernet traffic.

arrival traffic, as expected, the CLAD-1 scheduler does not provide significant gain over the CLAD-0 scheduler since the arrival traffic is not stationary and a simple histogram based predictor is not very accurate. The performance of the NCLAD-1 scheduler is near optimal for small delays. Thus, illustrating that with a perfect one-step predictor near optimal power is obtained for small delays. We found that the NCLAD-2 scheduler, which has perfect knowledge of 2 future arrivals, nearly achieves NOMP scheduler performance for even higher delays than the NCLAD-1 scheduler. For clarity the performance of the NCLAD-2 scheduler is not shown in Figure 6. IV. S CHEDULERS WITH STATISTICAL DELAY GUARANTEES In this section, we modify the scheduler design to provide statistical delay guarantees on the traffic. A. Statistical NOMP scheduler For a given arrival sequence {an }N 1 we now compute a lower bound on the power required by any scheduler which provides delay guarantees of the form (1). In this paper, we assume that packets which violate the delay bound are dropped

RAJAN: TOWARDS UNIVERSAL POWER EFFICIENT SCHEDULING IN GAUSSIAN CHANNELS

and retransmission will be ensured by higher layers.6 The statistical NOMP scheduler is computed in two steps: 1) Deterministic NOMP: Calculate vi,j and un like in the deterministic NOMP scheduler (Section III-A). 2) Dropping policy: Given δ and {an }N 1 , compute a dropping threshold udr such that no more than udr packets are transmitted in any time-slot n. At each time-slot n the remaining un −udr packets are dropped. The threshold udr is determined to ensure that the total fraction of dropped packets equals δ i.e., N N   (un − udr )+ = δ an . The dropping policy is essentially n=1

n=1

an inverse water-filling process, i.e., a threshold is set and all packets larger than the threshold are dropped. The optimality of this NOMP scheduler is discussed in Appendix D. The performance of the statistical NOMP scheduler is given in Figure 7a for two different values of δ. For a given value of δ, the average power is a decreasing function of the delay bound similar to the earlier case of absolute delay bounds. This rate of decrease is smaller for larger values of δ. The reduction in power with increasing δ is clear for all delays from the figure. The proposed statistical NOMP scheduler is constructed to ensure that over the entire arrival sequence {ai }N 1 not more than δ% of the packets violate the delay bound. However, this scheduler does not guarantee that over all subsets {ai }n1 lesser than δ fraction of packets will violate the delay bound. B. Statistical CLAD schedulers The proposed deterministic CLAD schedulers can be readily modified to guarantee statistical bounds on delay (1). There are three main steps in the calculation of the statistical CLAD schedulers namely: 1) Deterministic CLAD: Compute vk,j and un as given in Section III-B. 2) Adaptive dropping policy: At each time-slot n, compute n  ηal (n) = δ an the total number of packets that could i=1

have violated the delay bound and ηact (n) the actual number of dropped packets. Packets are dropped if un > uth n and ηact (n) ≤ ηal (n); the number of dropped packets equals th un − uth n , and un is the dropping threshold. The rationale behind this dropping policy comes from the realization that the transmission of large number of packets consume exponentially high power. Hence, the maximum packet transmission size is limited by setting a adaptively varying threshold. 3) Threshold update: The dropping threshold is adapted as th follows: uth n+1 = un + ∆th (ηact (n) − ηal (n)), where ∆th is the threshold updating step parameter. C. Numerical Results The performance of the statistical CLAD-0 scheduler is given in Figure 7a for two different values of δ. For large values of δ the reduction in power with increasing delays 6 Moreover, we assume partial packets can be dropped and retransmitted. Packet integrity constraints can be easily imposed in this framework by considering the optimal continuous valued solution and mapping them to discrete values.

815

is negligible, since most packets are dropped and there is not much variation in the transmission rate. As δ → 1, the required power reaches zero for all delay bounds since all packets are dropped. As δ → 0, the required power is the same as that of the deterministic schedulers. The performance of statistical CLAD-1 scheduler is also given in Figure 7a. It can be clearly seen from the figure that the performance of the CLAD-1 scheduler is better than the CLAD-0 scheduler but not as good as the CLAD-1 scheduler. In contrast to the statistical NOMP scheduler, the statistical CLAD schedulers are designed to ensure that over all finite time intervals {ai }ni=1 no more than δ% of the packets violate the delay bound. The variation of power of the CLAD-0 scheduler with δ is given in Figure 7b for two different delay bounds. As expected the power decreases rapidly with δ and eventually approaches 0 as delta → 1. Not surprisingly, the rate of decrease is higher for smaller delay bounds, since in that case the output traffic is more bursty than at higher delay bounds. D. Approximate analytical bound: Statistical scheduler Proceeding as before, we derive in Appendix C the following simple approximation for the behavior of statistical scheduler:     Rσu2 P = R λ+ log 1 − δ + 2 + (12) σ 2    log Φ Φ−1 (1 − δ) − Rσu , where Φ(.) is the standard Normal CDF. The numerical accuracy of the approximation is evident from Figure 7a. It should be noted that this closed form approximation is mainly used to observe trends in variation of power with delay, average traffic rate and packet loss probabilities. As one application of the approximation, in power constrained systems, one could drop larger fraction of packets to satisfy power constraints. For large SNR (P/σ 2 ), we can compute this fraction of packets to drop for a given power P0 and traffic from (12) as    (1 + Pσ20 ) 2 −1 δ = 1 − Φ R σu + Φ (13) 2 2 eRλ+R σu /2 There are many variations of the adaptive dropping and thresholding methods. Investigating other adaptation policies that achieve performance closer to the statistical NOMP scheduler should be considered in future work. V. C ONCLUSIONS In this paper, we introduced power efficient schedulers which provide deterministic and statistical guarantees on packet delays. The proposed schedulers achieve near optimal performance without prior knowledge of arrival traffic statistics. A universal lower bound is proposed that provides a lower bound on the performance of any scheduler that guarantees a desired delay bound. We believe that the lower bound introduced is not a tight bound for the class of causal schedulers and obtaining tighter bounds should be considered in future work. The proposed schedulers can be easily extended to include multiple flows with different delay constraints. For

816

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007

22

25

16 14

20

AVERAGE POWER

18

AVERAGE POWER

DELAY BOUND = 1 DELAY BOUND = 2

NOMP : δ = 0.01 NOMP : δ = 0.1 CLAD−1 : δ = 0.01 CLAD−1: δ = 0.1 CLAD−0 : δ = 0.01 CLAD−0 : δ = 0.1 CLOSED FORM : δ = 0.01 CLOSED FORM : δ = 0.1

20

12 10

15

10

8 5

6 4 2 1

2

3

4

5 DELAY

6

7

8

9

0 0

0.05

0.1

0.15

0.2 0.25 0.3 DROP PERCENTAGE δ

(a)

0.35

0.4

0.45

0.5

(b)

Fig. 7. a) Performance of proposed statistical NOMP, CLAD-1 and CLAD-0 schedulers as a function of delays for two different values of δ. The closed form approximation is also shown in the Figure. b) Variation of the power of CLAD-0 scheduler with δ for two different values of delays: The performance of statistical NOMP and CLAD-1 schedulers are similar and not shown.

multiple accessing schemes that are orthogonal in frequency or code space, the scheduling concept can be directly applied with appropriate modification to the power-rate formula. For multiple accessing schemes, based on time division multiplexing the proposed formulation can be applied using a modified form of the delay calculation. Extension to multi-hop scenarios should be considered in future research. ACKNOWLEDGMENTS The author thanks A.Sabharwal for some enlightening discussions on the paper contents. A PPENDIX A. Iterative water-filling First, it should be noted that optimization problem (2) does not have a unique minimizer. The objective function in (2) can be shown to be a convex function and the constraint set can be shown to be a convex set; thus, the local optimum equals the global optimum. By a simple change of variables, optimization problem (2) can be rewritten as PN∗ OMP

= min {ui }

N 1  P (un ) N n=1

0 ≤ un ,

n−D 0 +1  j=1

to (2). For example, when D0 = 2, set v1,0 = u1 , v2,1 = a1 − u1 , v2,0 = u2 − v2,1 , . . .. In general, more than one set {vi,j } corresponds to a given set {ui }. Hence, the optimization problems (2) and (14) have the same minimum. Now, we explain the iterative process used to solve (2). k the number of packets At the k th iteration denote by vn,i transmitted at time slot n that arrived at time n − i. Consider an arrival sequence {an } of length N . At each time-slot n k compute vn+i,i for i = 0, 1, . . . , D0 − 1 based on two factors: i) The number of packets scheduled for transmission in timeslots n + 1, ..., n + D0 − 1 by the (k − 1)th iteration among the packets that arrived during time-slots n + 1, . . . , n + D0 − 1, and ii) The number of packets scheduled for transmission in time-slots n, n + 1, . . . , n + D0 − 1 by the k th iteration among the packets that arrived during time-slots an−1 0. ⎛, . . . , an−D⎞ D 0 −1 k Further, vn+i,i is computed to minimize P ⎝ u ˜kn+j ⎠ j=0

where u ˜kn+j =

aj ≤

j=1

uj ≤

n 

j=0

i=0

k vn+j,j = ⎝β −

k−1 vn+j,i . The solution to this

D 0 −1

k vn+j,i −

i=j+1

j=1

every set of {ui } that satisfies constraints to (14) we can compute at least one set of {vi,j } that satisfies constraints

i=j

k vn+j,i +



aj

The Hessian matrix for the objective function (14) can be computed and shown to be positive definite and thus (14) is a strictly convex function. Thus, (14) has a unique minimizer. The equivalence between the two optimization problems (2) and (14) can be explained based on the relationship between {vi,j } and {ui }. For any given set {vi,j } that satisfies the constraints to (2), we can compute a set {ui } that satisfies D 0 −1  vi,j . Similarly, for constraints to (14) by choosing ui =

j−1 

optimization problem is given by water-filling techniques as

(14) n 

D 0 −1

where β is computed from

j−1 

⎞+ k−1 ⎠ vn+j,i

(15)

i=0

D 0 −1

 + k β − vn+j,j = an The

j=0

average power after the k th iteration is given by P (k) = D N 0 −1   k 1 k k , where u P u = vi,j . The variation of the i i N i=1

j=0

power with iteration is given in Figure 8, which shows that the iterative process converges within a few iterations for all delay bounds. As noted earlier, since the problem is convex this iterative procedure converges to the global minimum.

RAJAN: TOWARDS UNIVERSAL POWER EFFICIENT SCHEDULING IN GAUSSIAN CHANNELS R2 σ2

s, t < ∞. Indeed λR + 2D0a exactly equals the effective bandwidth of a Gaussian source evaluated at t = 1, s = D10 . The Gaussian traffic source is defined [21] as X[0, t] = λRt+ Z(t), where Z(t) is normally distributed with zero mean. As expected, at D0 → ∞, the variation in input traffic are smoothened and we obtain Shannon’s capacity formulation. Note also the similarity of (16) with the results in [8], which gives the average power as a function of the average delay. In [8], no bound on the absolute delay is imposed. In the case of dependent traffic arrivals, we continue to assume that the output distribution is asymptotically Gaussian. In this case, the mean of the output distribution equals λ and the variance equals

10 ABSOLUTE DELAY 2 ABSOLUTE DELAY 4 ABSOLUTE DELAY 10

9.5 9

AVERAGE POWER

8.5 8 7.5 7 6.5 6 5.5 5 1

2

3

4

5

6

817

7

NUMER OF ITERATIONS

Fig. 8. Convergence of iterative process in computing the lower bound on powers at different absolute delay constraints.

σu2

= = =

B. Approximate closed form analysis of memoryless scheduler For i.i.d. traffic arrivals, the distribution of the output packets for delay bound D0 is given by the convolution of the distribution of the arrival traffic. For example, when D0 = 2, the output distribution is given by P r(un = i) = =

2i  k=0 2i 

P r(an−1 = k, an = 2i − k) P r(an−1 = k)P r(an = 2i − k)

k=0

where the joint distribution is written as the product of the marginals due to the i.i.d. nature of arrival traffic. A similar expression involving integrals results if the input distribution is continuous.By the Central Limit Theorem, for large delays, the output distribution may be approximated as a Gaussian distribution. The mean of the output distribution equals E[an ] and the variance may be computed as σu2 = a +...+a E[( 1 D0 D0 )2 ] − (E[an ])2 . For i.i.d traffic, this variance can σ2

E[u2n ] − E[un ]2 (17) 1 E[(an + an+1 + . . . + an+D0 −1 )2 ] − λ2 (18) D02 D 0 −1 (D0 − i) Ra (i) − λ2 , (19) 2 D 0 i=0

where Ra (i) = E[an an+i ] is the autocorrelation of the input sequence. Further, proceeding as before an approximate relationship for power can be derived as (11). C. Closed form approximation: Statistical Scheduler In the case of the statistical delay guarantees, we make the same assumption on Gaussianity of output traffic. In addition, we assume that the dropping policy is such that all high rate transmissions are truncated. Thus, the output traffic, which is assumed to have mean λ and variance σu2 , is truncated beyond size β. The truncation threshold β is calculated, as follows, to ensure that only δ fraction of packets are dropped  β 2 1 − (x−λ)  e 2σu2 dx = 1 − δ (20) 2πσu2 −∞  β−λ σu 2 1 √ =⇒ e−s /2 dx = 1 − δ (21) 2π  −∞ β−λ =⇒ Φ = 1 − δ, (22) σu

be further evaluated and shown to equal Da0 . The total transmit power can now be approximated as,  ∞ (x−λ)2 D0 σ2 − 2 2σa (eRx − 1)e dx P =  2 2πσa /D0 −∞  ∞ 2x x2 +λ2 −2λx−2Rσu σ2 − 2 2σu =  e dx − 1 2πσa2 /D0 −∞    2 2 2 2 u) eRλ+R σu /2 ∞ − (x−λ−σ 2 2 2Rσu  e dx − 1 = σ 2πσa2 /D0 −∞   R2 σ 2 2 Rλ 2D0a = σ e e −1

where Φ is the standard normal CDF. The transmission power can now be calculated as,  β (x−λ)2 D0 1 − 2 2 2σa P = σ  (eRx − 1)e dx 2πσa2 /D0 −∞    2 2 2 2 u) eRλ+R σu /2 β − (x−λ−Rσ 2 2 2σu  e dx − 1 = σ 2πσa2 /D0 −∞   2 R 2 σa = σ 2 eRλ e 2D0 Φ[Φ−1 (1 − δ) − Rσu ] − 1 + δ

  P R2 σa2 log 1 + 2 = Rλ + . σ 2D0

D. Optimality of statistical NOMP scheduler. Heuristic Argument: For a delay bound of 1 time-slot, the proof follows directly from the exponential relationship between power and rate given by Shannon’s Gaussian formula.7

Thus,

(16)

Note the remarkable similarity in the expression on the right and the form for the effective bandwidth [21]. The effective 1 log E[esX[0,t] ], 0 < bandwidth is defined [21] as α(s, t) = st

By rearranging terms and taking logarithm, we obtain (12).

7 Actually a convex relationship is sufficient for the proof and all practical coding and modulation schemes follow a convex relationship.

818

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 4, MAY 2007

Let each packet be subdivided into “bits” (or in general symbols) which are the smallest indivisible pieces of information. Let us assume that only one bit of information may be dropped from the entire sequence. Clearly, the optimum bit to drop that results in largest reduction of power is from the instant when un is maximum. Now, to drop the second (and all further) bits, a similar process can be used and thus bits are dropped from the largest resulting outputs. Essentially, this is a process of inverse water-filling, in which a threshold for the number of atoms (packets) is set and all packets bigger than the threshold are dropped. The dropping threshold is calculated to ensure that no more than δ% of the packets are dropped. A similar argument can be used for arbitrary delay bounds D0 . Initially compute the optimal NOMP scheduler. Now, if only one bit can be dropped, the optimal bit to drop is drop is from the largest occurring packet transmission in the deterministic NOMP scheduler. Repeating the process till δ% of packets are dropped we see that the proposed stationary NOMP scheduler is optimal. Proof: The problem of providing statistical guarantees is now posed as follows. Let un denote the number of packets that would have been scheduled for transmission in time-slot n using the NOMP scheduler, i.e. with no packets violating the delay bound. Let un denote the number of packets transmitted by the statistical NOMP scheduler. Since, δ% of the packets N  may violate the delay bound, we have the constraint un = (1 − δ) N 

N 

un

≈ (1 − δ)

n=1

N 

n=1

an . The approximation

n=1

N 

un ≈

n=1

an , arises due to the boundary conditions8 and does not

n=1

affect the results for large N . The problem of minimizing the power is now posed as follows: min

{un }

s.t.

σ2

N 

eRun − 1

(23)

[6] D. J. Goodman, J. Borras, N. B. Mandayam, and R. Yates, “INFOSTATIONS: A new system model for data and messaging services,” Proc. Vehicular Technology Conference, pp. 969–973, May 1997. [7] B. Collins and R. L. Cruz, “Transmission policies for time varying channels with average delay constraints,” in Proc. Allerton Intnl. Conf. on Comm., Control and Computing, Monticello, IL, 1999, pp. 709–717. [8] D. Rajan, A. Sabharwal, and B. Aazhang, “Delay bounded packet scheduling of bursty traffic over wireless channels,” IEEE Trans. Inform. Theory, vol. 50, no. 1, pp. 125–144, 2004. [9] B. Prabhakar, E. U. Biyikoglu, and A. E. Gamal, “Energy-efficient transmission over a wireless link via lazy packet scheduling,” in Proc. INFOCOM, Anchorage, Alaska, April 2001. [10] R. A. Berry and R. G. Gallager, “Communication over fading channels with delay constraints,” IEEE Trans. Inform. Theory, vol. 48, no. 5, pp. 1135–1149, May 2002. [11] H. Zhang, “Service disciplines for guaranteed performance service in packet-switching networks,” Proceedings of the IEEE, October 1995. [12] V. Bharghavan, S. Lu, and T. Nandagopal, “Fair scheduling in wireless packet networks: Issues and approaches,” IEEE Pers. Commun. Mag., vol. 6, no. 1, pp. 44–55, Feb. 1999. [13] X. Liu, E. K. P. Chong, and N. B. Shroff, “Transmission scheduling for efficient wireless utilization,” Proc. INFOCOM, 2001. [14] M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, R. Vijayakumar, and P. Whiting, “CDMA data QoS scheduling on the forward link with variable channel conditions,” Tech. Rep., Bell Labs., 2000. [15] N. Joshi, et. al, “Downlink scheduling in CDMA data networks,” in Proc. MOBICOM, 2000, pp. 179–190. [16] M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, P. Whiting, and R. Vijayakumar, “Providing quality of service over a shared wireless link,” IEEE Commun. Mag., vol. 39, no. 2, pp. 150–154, Feb. 2001. [17] R. Knopp and P. A. Humblet, “Information capacity and power control in single cell multiuser communications,” in Proc. ICC, 1995. [18] D. Tse, “Opportunistic communications: Smart scheduling and dumb antennas,” Seminar presented at Intel Corp., January 2002. [19] T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley, New York, 1991. [20] D. Rajan, A. Sabharwal, and B. Aazhang, “Outage behaviour with delay and CSIT,” in Proc. ICC, Paris, France, June 2004, pp. 578–582. [21] F. Kelly, “Notes on effective bandwidth,” Technical report available at ˜ http://www.statslab.cam.ac.uk/frank/. [22] “Thirty days of wide-area tcp connections,” http://ita.ee.lbl.gov/html/contrib/LBL-CONN-7.html. [23] V. Paxson and S. Floyd, “Wide-area traffic: The failure of Poisson modeling,” IEEE Trans. Networking, vol. 3, no. 3, pp. 226–244, June 1995. [24] W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, “On the self-similar nature of ethernet traffic,” Proc. ACM SIGCOMM, 1993. [25] S. Lin and D. J. Costello, Error control coding: Fundamentals and Applications. Prentice Hall, second edition, 2004.

n=1

un ≤ un ,

N 

un = (1 − δ)

n=1

N 

un ≈ (1 − δ)

n=1

N 

Dinesh Rajan received the B.Tech. degree in Electrical Engineering from Indian Institute of Technology, Madras in 1997. He received his M.S. and Ph.D. degrees in Electrical and Computer Engineering in 1999 and 2002, respectively, from Rice University, Houston, Texas. He joined the Electrical Engineering Department at Southern Methodist University, Dallas, Texas in 2002, where he is currently an assistant professor. He received a NSF CAREER award in 2006. His current research interests include communications theory, wireless networks and in-

an

n=1

The solution to this optimization problem is easily derived using Lagrangian techniques and is given by un = min(un , udr ), where that is N udr is a droppingthreshold N calculated from n=1 (un − udr )+ = (δ) n=1 an . R EFERENCES [1] S. Keshav, An Engineering Approach to Computer Networks. AddisonWesley Longman, Inc., 1997. [2] E. Biglieri, J. G. Proakis, and S. Shamai, “Fading channels: Informationtheoretic and communications aspects,” IEEE Trans. Inform. Theory, vol. 44, no. 6, pp. 2619–2692, October 1998. [3] R. G. Gallager, “A perspective on multiaccess channels,” IEEE Trans. Inform. Theory, vol. 31, no. 2, pp. 124–142, Mar. 1985. [4] A. Ephremides and B. Hajek, “Information theory and communication networks: An unconsummated union,” IEEE Trans. Inform. Theory, vol. 44, no. 6, pp. 2416–2434, Oct. 1998. [5] A. J. Goldsmith and P. P. Varaiya, “Capacity of fading channels with channel side information,” IEEE Trans. Inform. Theory, vol. 43, no. 6, pp. 1986–1992, Nov. 1997. 8 all

aN packets may not be transmitted during time-slot N .

formation theory.

Suggest Documents